Zhoujun Li

Orcid: 0000-0002-9603-9713

Affiliations:
  • Beihang University, State Key Lab of Software Development Environment, Beijing, China


According to our database1, Zhoujun Li authored at least 394 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
m3P: Towards Multimodal Multilingual Translation with Multimodal Prompt.
CoRR, 2024

New Intent Discovery with Attracting and Dispersing Prototype.
CoRR, 2024

Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging.
CoRR, 2024

C-ICL: Contrastive In-context Learning for Information Extraction.
CoRR, 2024

REALM: RAG-Driven Enhancement of Multimodal Electronic Health Records Analysis via Large Language Models.
CoRR, 2024

WGAN-AFL: Seed Generation Augmented Fuzzer with Wasserstein-GAN.
CoRR, 2024

VIPTR: A Vision Permutable Extractor for Fast and Efficient Scene Text Recognition.
CoRR, 2024

MLAD: A Unified Model for Multi-system Log Anomaly Detection.
CoRR, 2024

xCoT: Cross-lingual Instruction Tuning for Cross-lingual Chain-of-Thought Reasoning.
CoRR, 2024

MCL-NER: Cross-Lingual Named Entity Recognition via Multi-View Contrastive Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree.
Symmetry, December, 2023

Deep Person Generation: A Survey from the Perspective of Face, Pose, and Cloth Synthesis.
ACM Comput. Surv., December, 2023

GTrans: Grouping and Fusing Transformer Layers for Neural Machine Translation.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

KINet: Incorporating Relevant Facts Into Knowledge-Grounded Dialog Generation.
IEEE ACM Trans. Audio Speech Lang. Process., 2023

Aye: A Trusted Forensic Method for Firmware Tampering Attacks.
Symmetry, 2023

Scanning, attention, and reasoning multimodal content for sentiment analysis.
Knowl. Based Syst., 2023

Unsupervised abstractive summarization via sentence rewriting.
Comput. Speech Lang., 2023

MAC-SQL: A Multi-Agent Collaborative Framework for Text-to-SQL.
CoRR, 2023

OWL: A Large Language Model for IT Operations.
CoRR, 2023

Unleashing Potential of Evidence in Knowledge-Intensive Dialogue Generation.
CoRR, 2023

MT4CrossOIE: Multi-stage Tuning for Cross-lingual Open Information Extraction.
CoRR, 2023

KnowPrefix-Tuning: A Two-Stage Prefix-Tuning Framework for Knowledge-Grounded Dialogue Generation.
CoRR, 2023

Unleashing Infinite-Length Input Capacity for Large-scale Language Models with Self-Controlled Memory System.
CoRR, 2023

Retrieval-Augmented Classification with Decoupled Representation.
CoRR, 2023

Character, Word, or Both? Revisiting the Segmentation Granularity for Chinese Pre-trained Language Models.
CoRR, 2023

Multi-task Transformer with Relation-attention and Type-attention for Named Entity Recognition.
CoRR, 2023

Multilingual Entity and Relation Extraction from Unified to Language-specific Training.
CoRR, 2023

A Survey on Deep Learning for Website Fingerprinting Attacks and Defenses.
IEEE Access, 2023

QURG: Question Rewriting Guided Context-Dependent Text-to-SQL Semantic Parsing.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

KnowPrefix-Tuning: A Two-Stage Prefix-Tuning Framework for Knowledge-Grounded Dialogue Generation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

COME: Commit Message Generation with Modification Embedding.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Learning Unified Video-Language Representations via Joint Modeling and Contrastive Learning for Natural Language Video Localization.
Proceedings of the International Joint Conference on Neural Networks, 2023

IoTAEG: Automatic Exploit Generation of IoT Devices.
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023

Label-Guided Contrastive Learning for Out-of-Domain Detection.
Proceedings of the IEEE International Conference on Acoustics, 2023

Multi-Task Transformer with Relation-Attention and Type-Attention for Named Entity Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2023

Multi-Stage Pre-training Enhanced by ChatGPT for Multi-Scenario Multi-Domain Dialogue Summarization.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

M2C: Towards Automatic Multimodal Manga Complement.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Enhancing Dialogue Summarization with Topic-Aware Global- and Local- Level Centrality.
Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, 2023

Modeling Intra-class and Inter-class Constraints for Out-of-Domain Detection.
Proceedings of the Database Systems for Advanced Applications, 2023

HanoiT: Enhancing Context-aware Translation via Selective Context.
Proceedings of the Database Systems for Advanced Applications, 2023

LogLG: Weakly Supervised Log Anomaly Detection via Log-Event Graph Construction.
Proceedings of the Database Systems for Advanced Applications, 2023

GripRank: Bridging the Gap between Retrieval and Generation via the Generative Knowledge Improved Passage Ranking.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Multilingual Entity and Relation Extraction from Unified to Language-specific Training.
Proceedings of the International Conference on Electronics, 2023

Read Then Respond: Multi-granularity Grounding Prediction for Knowledge-Grounded Dialogue Generation.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

Pay Attention to Implicit Attribute Values: A Multi-modal Generative Framework for AVE Task.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

GanLM: Encoder-Decoder Pre-training with an Auxiliary Discriminator.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

Know What I don't Know: Handling Ambiguous and Unknown Questions for Text-to-SQL.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023

Low Resource Quantitative Information Extraction via Structure Searching and Prefix-Based Text Generation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

TrOCR: Transformer-Based Optical Character Recognition with Pre-trained Models.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
An improved stochastic gradient descent algorithm based on Rényi differential privacy.
Int. J. Intell. Syst., December, 2022

Cross-Attentional Spatio-Temporal Semantic Graph Networks for Video Question Answering.
IEEE Trans. Image Process., 2022

Visual Sentiment Analysis With Social Relations-Guided Multiattention Networks.
IEEE Trans. Cybern., 2022

ALSA: Adversarial Learning of Supervised Attentions for Visual Question Answering.
IEEE Trans. Cybern., 2022

Improving Unsupervised Extractive Summarization by Jointly Modeling Facet and Redundancy.
IEEE ACM Trans. Audio Speech Lang. Process., 2022

Dynamic self-attention with vision synchronization networks for video question answering.
Pattern Recognit., 2022

Neighbor enhanced graph convolutional networks for node classification and recommendation.
Knowl. Based Syst., 2022

A new methodology for anomaly detection of attacks in IEC 61850-based substation system.
J. Inf. Secur. Appl., 2022

Know What I don't Know: Handling Ambiguous and Unanswerable Questions for Text-to-SQL.
CoRR, 2022

LVP-M3: Language-aware Visual Prompt for Multilingual Multimodal Machine Translation.
CoRR, 2022

Modeling Paragraph-Level Vision-Language Semantic Alignment for Multi-Modal Summarization.
CoRR, 2022

GTrans: Grouping and Fusing Transformer Layers for Neural Machine Translation.
CoRR, 2022

HLT-MT: High-resource Language-specific Training for Multilingual Neural Machine Translation.
CoRR, 2022

TANet: Thread-Aware Pretraining for Abstractive Conversational Summarization.
CoRR, 2022

TransLog: A Unified Transformer-based Framework for Log Anomaly Detection.
CoRR, 2022

Multilevel Attention Networks and Policy Reinforcement Learning for Image Caption Generation.
Big Data, 2022

Cdga: A GAN-based Controllable Domain Generation Algorithm.
Proceedings of the IEEE International Conference on Trust, 2022

Generative Adversarial Framework for Cold-Start Item Recommendation.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022

TANet: Thread-Aware Pretraining for Abstractive Conversational Summarization.
Proceedings of the Findings of the Association for Computational Linguistics: NAACL 2022, 2022

Modeling Multi-Granularity Hierarchical Features for Relation Extraction.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022

Towards Modeling Role-Aware Centrality for Dialogue Summarization.
Proceedings of the 2nd Conference of the Asia-Pacific Chapter of the Association for Computational Linguistics and the 12th International Joint Conference on Natural Language Processing, 2022

UM4: Unified Multilingual Multiple Teacher-Student Model for Zero-Resource Neural Machine Translation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

High-resource Language-specific Training for Multilingual Neural Machine Translation.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

PATS: Sensitivity-aware Noisy Learning for Pretrained Language Models.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

CROP: Zero-shot Cross-lingual Named Entity Recognition with Multilingual Labeled Sequence Translation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

CQR-SQL: Conversational Question Reformulation Enhanced Context-Dependent Text-to-SQL Parsers.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

LVP-M3: Language-aware Visual Prompt for Multilingual Multimodal Machine Translation.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

PAEG: Phrase-level Adversarial Example Generation for Neural Machine Translation.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

An Efficient Coarse-to-Fine Facet-Aware Unsupervised Summarization Framework Based on Semantic Blocks.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

Towards Robustness of Text-to-SQL Models Against Natural and Realistic Adversarial Table Perturbation.
Proceedings of the 60th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2022

2021
Adversarial Learning With Multi-Modal Attention for Visual Question Answering.
IEEE Trans. Neural Networks Learn. Syst., 2021

Social Image Sentiment Analysis by Exploiting Multimodal Content and Heterogeneous Relations.
IEEE Trans. Ind. Informatics, 2021

Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021

Multimodal Learning of Social Image Representation by Exploiting Social Relations.
IEEE Trans. Cybern., 2021

Dual self-attention with co-attention networks for visual question answering.
Pattern Recognit., 2021

Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder.
J. Netw. Comput. Appl., 2021

An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features.
Expert Syst. Appl., 2021

Privacy Model: Detect Privacy Leakage for Chinese Browser Extensions.
IEEE Access, 2021

AnaSearch: Extract, Retrieve and Visualize Structured Results from Unstructured Text for Analytical Queries.
Proceedings of the WSDM '21, 2021

Learning to Select Relevant Knowledge for Neural Machine Translation.
Proceedings of the Natural Language Processing and Chinese Computing, 2021

Smart-Start Decoding for Neural Machine Translation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Inductive and Effective Privacy-preserving Semi-supervised Learning with Harmonic Anchor Mixture.
Proceedings of the ISEEIE 2021: International Symposium on Electrical, Electronics and Information Engineering, Seoul Republic of Korea, February 19, 2021

Non-Recursive Graph Convolutional Networks.
Proceedings of the IEEE International Conference on Acoustics, 2021

Unsupervised Keyphrase Extraction by Jointly Modeling Local and Global Context.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

TWT: Table with Written Text for Controlled Data-to-Text Generation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

Jointly Learning to Repair Code and Generate Commit Message.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Enhancing Dialogue-based Relation Extraction by Speaker and Trigger Words Prediction.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

Matching Distributions between Model and Data: Cross-domain Knowledge Distillation for Unsupervised Domain Adaptation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

Multilingual Agreement for Multilingual Neural Machine Translation.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

Improving Unsupervised Extractive Summarization with Facet-Aware Modeling.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

A Unified Multi-Task Learning Framework for Joint Extraction of Entities and Relations.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Open Domain Dialogue Generation with Latent Images.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

Learning to Copy Coherent Knowledge for Response Generation.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Attention-Based Modality-Gated Networks for Image-Text Sentiment Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Visual Question Answering via Combining Inferential Attention and Semantic Space Mapping.
Knowl. Based Syst., 2020

Mixture distribution modeling for scalable graph-based semi-supervised learning.
Knowl. Based Syst., 2020

面向自然语言处理的预训练技术研究综述 (Survey of Natural Language Processing Pre-training Techniques).
计算机科学, 2020

A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes.
Inf. Sci., 2020

Open Domain Dialogue Generation with Latent Images.
CoRR, 2020

Detecting bi-level false data injection attack based on time series analysis method in smart grid.
Comput. Secur., 2020

Real-Time Intrusion Detection in Wireless Network: A Deep Learning-Based Intelligent Mechanism.
IEEE Access, 2020

Mixture-Model-Based Graph for Privacy-Preserving Semi-Supervised Learning.
IEEE Access, 2020

A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic.
Proceedings of the 19th IEEE International Conference on Trust, 2020

LARQ: Learning to Ask and Rewrite Questions for Community Question Answering.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

Down to the Last Detail: Virtual Try-on with Fine-grained Details.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

TableBank: Table Benchmark for Image-based Table Detection and Recognition.
Proceedings of The 12th Language Resources and Evaluation Conference, 2020

Asking Effective and Diverse Questions: A Machine Reading Comprehension based Framework for Joint Entity-Relation Extraction.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

StyleDGPT: Stylized Response Generation with Pre-trained Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

Formality Style Transfer with Shared Latent Space.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

DocBank: A Benchmark Dataset for Document Layout Analysis.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Entity Relative Position Representation Based Multi-head Selection for Joint Entity and Relation Extraction.
Proceedings of the Chinese Computational Linguistics - 19th China National Conference, CCL 2020, Hainan, China, October 30, 2020

Label-Aware Graph Convolutional Networks.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Graph Unfolding Networks.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020

Super Root: A New Stealthy Rooting Technique on ARM Devices.
Proceedings of the Applied Cryptography and Network Security, 2020

Improving Neural Machine Translation with Soft Template Prediction.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

Alternating Language Modeling for Cross-Lingual Pre-Training.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Bi-Directional Spatial-Semantic Attention Networks for Image-Text Matching.
IEEE Trans. Image Process., 2019

Visual-textual sentiment classification with bi-directional multi-level attention networks.
Knowl. Based Syst., 2019

Adversarial learning for multi-view network embedding on incomplete graphs.
Knowl. Based Syst., 2019

Image-text sentiment analysis via deep multimodal attentive fusion.
Knowl. Based Syst., 2019

Network embedding by fusing multimodal contents and links.
Knowl. Based Syst., 2019

基于双语主题模型和双语词向量的跨语言知识链接 (Cross-language Knowledge Linking Based on Bilingual Topic Model and Bilingual Embedding).
计算机科学, 2019

Label Aware Graph Convolutional Network - Not All Edges Deserve Your Attention.
CoRR, 2019

Multi-Hot Compact Network Embedding.
CoRR, 2019

A Sequential Matching Framework for Multi-Turn Response Selection in Retrieval-Based Chatbots.
Comput. Linguistics, 2019

Sentiment analysis of social images via hierarchical deep fusion of content and links.
Appl. Soft Comput., 2019

Visual question answering via Attention-based syntactic structure tree-LSTM.
Appl. Soft Comput., 2019

Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage.
IEEE Access, 2019

Large-scale Detection of Privacy Leaks for BAT Browsers Extensions in China.
Proceedings of the 2019 International Symposium on Theoretical Aspects of Software Engineering, 2019

FGST: Fine-Grained Spatial-Temporal Based Regression for Stationless Bike Traffic Prediction.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

Read, Attend and Comment: A Deep Architecture for Automatic News Comment Generation.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Low-Resource Response Generation with Template Prior.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Harnessing Pre-Trained Neural Networks with Rules for Formality Style Transfer.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Leveraging Adjective-Noun Phrasing Knowledge for Comparison Relation Prediction in Text-to-SQL.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Capsule Networks for Chinese Opinion Questions Machine Reading Comprehension.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

Multi-Hot Compact Network Embedding.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Partially Shared Adversarial Learning For Semi-supervised Multi-platform User Identity Linkage.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Leveraging Web Semantic Knowledge in Word Representation Learning.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Adversarial Learning for Weakly-Supervised Social Network Alignment.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Response Generation by Context-Aware Prototype Editing.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Differential Privacy With Bias-Control Limited Sources.
IEEE Trans. Inf. Forensics Secur., 2018

Landmark Image Retrieval by Jointing Feature Refinement and Multimodal Classifier Learning.
IEEE Trans. Cybern., 2018

Classify social image by integrating multi-modal content.
Multim. Tools Appl., 2018

Unsupervised geographically discriminative feature learning for landmark tagging.
Knowl. Based Syst., 2018

Response selection from unstructured documents for human-computer conversation systems.
Knowl. Based Syst., 2018

From content to links: Social image embedding with deep multimodal model.
Knowl. Based Syst., 2018

基于触发词语义选择的Twitter事件共指消解研究 (Selective Expression Approach Based on Event Trigger for Event Coreference Resolution on Twitter).
计算机科学, 2018

Response selection with topic clues for retrieval-based chatbots.
Neurocomputing, 2018

Exploit latent Dirichlet allocation for collaborative filtering.
Frontiers Comput. Sci., 2018

Response Generation by Context-aware Prototype Editing.
CoRR, 2018

TI-CNN: Convolutional Neural Networks for Fake News Detection.
CoRR, 2018

r-instance Learning for Missing People Tweets Identification.
CoRR, 2018

Understanding and Monitoring Human Trafficking via Social Sensors: A Sociological Approach.
CoRR, 2018

TinyVisor: An extensible secure framework on android platforms.
Comput. Secur., 2018

Multi-modal kernel ridge regression for social image classification.
Appl. Soft Comput., 2018

Deep multi-view representation learning for social images.
Appl. Soft Comput., 2018

Unrest News Amount Prediction with Context-Aware Attention LSTM.
Proceedings of the PRICAI 2018: Trends in Artificial Intelligence, 2018

Improved Neural Machine Translation with Chinese Phonologic Features.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Response Selection of Multi-turn Conversation with Deep Neural Networks.
Proceedings of the Natural Language Processing and Chinese Computing, 2018

Learning Joint Multimodal Representation with Adversarial Attention Networks.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Multimodal Network Embedding via Attention based Multi-view Variational Autoencoder.
Proceedings of the 2018 ACM on International Conference on Multimedia Retrieval, 2018

Ensemble Neural Relation Extraction with Adaptive Boosting.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

SSDMV: Semi-Supervised Deep Social Spammer Detection by Multi-view Data Fusion.
Proceedings of the IEEE International Conference on Data Mining, 2018

Fuzz Testing Based on Virtualization Technology.
Proceedings of the 2018 International Conference on Computing and Artificial Intelligence, 2018

Keyphrase Generation with Correlation Constraints.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

H-Securebox: A Hardened Memory Data Protection Framework on ARM Devices.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Adversarial Learning of Answer-Related Representation for Visual Question Answering.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Distribution Distance Minimization for Unsupervised User Identity Linkage.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

Resilient decentralized Android application repackaging detection using logic bombs.
Proceedings of the 2018 International Symposium on Code Generation and Optimization, 2018

Attribute Extraction by Combing Feature Ranking and Sequence Labeling.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

Event Extraction with Deep Contextualized Word Representation and Multi-attention Layer.
Proceedings of the Advanced Data Mining and Applications - 14th International Conference, 2018

Learning Matching Models with Weak Supervision for Response Selection in Retrieval-based Chatbots.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

Assertion-Based QA With Question-Aware Open Information Extraction.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Neural Response Generation With Dynamic Vocabularies.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Knowledge Enhanced Hybrid Neural Network for Text Matching.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Computing Urban Traffic Congestions by Incorporating Sparse GPS Probe Data and Social Media Data.
ACM Trans. Inf. Syst., 2017

Named entity disambiguation for questions in community question answering.
Knowl. Based Syst., 2017

基于Web的问答系统综述 (Survey on Web-based Question Answering).
计算机科学, 2017

基于Wine的Windows安全机制模拟及沙箱系统实现 (Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine).
计算机科学, 2017

Neural Response Generation with Dynamic Vocabularies.
CoRR, 2017

Content-Based Table Retrieval for Web Queries.
CoRR, 2017

DTRP: A Flexible Deep Framework for Travel Route Planning.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Beihang-MSRA at SemEval-2017 Task 3: A Ranking System with Neural Matching Features for Community Question Answering.
Proceedings of the 11th International Workshop on Semantic Evaluation, 2017

Idology and Its Applications in Public Security and Network Security.
Proceedings of the Intelligence and Security Informatics - 12th Pacific Asia Workshop, 2017

Beihang at the NTCIR-13 STC-2 Task.
Proceedings of the 13th NTCIR Conference, 2017

Learning Social Image Embedding with Deep Multimodal Attention Networks.
Proceedings of the on Thematic Workshops of ACM Multimedia 2017, Mountain View, CA, USA, October 23, 2017

Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

PPNE: Property Preserving Network Embedding.
Proceedings of the Database Systems for Advanced Applications, 2017

Semi-Supervised Network Embedding.
Proceedings of the Database Systems for Advanced Applications, 2017

HypTracker: A Hypervisor to Detect Malwares Through System Call Analysis on ARM.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

From Properties to Links: Deep Network Embedding on Incomplete Graphs.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Jointly Extracting Relations with Class Ties via Effective Deep Ranking.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

Sequential Matching Network: A New Architecture for Multi-turn Response Selection in Retrieval-Based Chatbots.
Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, 2017

Chinese Answer Extraction Based on POS Tree and Genetic Algorithm.
Proceedings of the 9th SIGHAN Workshop on Chinese Language Processing, 2017

Building Task-Oriented Dialogue Systems for Online Shopping.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Learning Geographical Hierarchy Features via a Compositional Model.
IEEE Trans. Multim., 2016

Unsupervised Head-Modifier Detection in Search Queries.
ACM Trans. Knowl. Discov. Data, 2016

Coranking the Future Influence of Multiobjects in Bibliographic Network Through Mutual Reinforcement.
ACM Trans. Intell. Syst. Technol., 2016

Geographical Topics Learning of Geo-Tagged Social Images.
IEEE Trans. Cybern., 2016

Integrating multiple types of features for event identification in social images.
Multim. Tools Appl., 2016

CPB: a classification-based approach for burst time prediction in cascades.
Knowl. Inf. Syst., 2016

Security of weak secrets based cryptographic primitives via the Rényi entropy.
IET Inf. Secur., 2016

Sequential Match Network: A New Architecture for Multi-turn Response Selection in Retrieval-based Chatbots.
CoRR, 2016

Knowledge Enhanced Hybrid Neural Network for Text Matching.
CoRR, 2016

Topic Augmented Neural Network for Short Text Conversation.
CoRR, 2016

Idology and Its Applications in Public Security and Network Security.
CoRR, 2016

Learning Distributed Representations of Data in Community Question Answering for Question Retrieval.
Proceedings of the Ninth ACM International Conference on Web Search and Data Mining, 2016

H-Binder: A Hardened Binder Framework on Android Systems.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Open Domain Topic Prediction Model for Answer Selection.
Proceedings of the Natural Language Understanding and Intelligent Applications, 2016

Estimating Urban Traffic Congestions with Multi-sourced Data.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Detecting Context Dependent Messages in a Conversational Environment.
Proceedings of the COLING 2016, 2016

Query Classification by Leveraging Explicit Concept Information.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

DocChat: An Information Retrieval Approach for Chatbot Engines Using Unstructured Documents.
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, 2016

Aggregating Inter-Sentence Information to Enhance Relation Extraction.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

Improving Recommendation of Tail Tags for Questions in Community Question Answering.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Exploiting social circle broadness for influential spreaders identification in social networks.
World Wide Web, 2015

基于混合双层模型的DHT网络路由表快照算法 (Hybrid Method for Capturing Snapshot of Routing Table of DHT Networks).
计算机科学, 2015

Event detection and popularity prediction in microblogging.
Neurocomputing, 2015

Search engine reinforced semi-supervised classification and graph-based summarization of microblogs.
Neurocomputing, 2015

Transferable conditional e-cash with optimal anonymity in the standard model.
IET Inf. Secur., 2015

Achieving Differential Privacy with Bias-Control Limited Source.
IACR Cryptol. ePrint Arch., 2015

One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority.
Comput. J., 2015

Exploring Social Network Information for Solving Cold Start in Product Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Friendship Link Recommendation Based on Content Structure Information.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Transferable Optimal-size Fair E-cash with Optimal Anonymity.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

PathWalker: A Dynamic Symbolic Execution Tool Based on LLVM Byte Code Instrumentation.
Proceedings of the Dependable Software Engineering: Theories, Tools, and Applications, 2015

Location Prediction of Social Images via Generative Model.
Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, 2015

Non-malleable Extractors with Shorter Seeds and Their Applications.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

Learning Geographical Hierarchy Features for Social Image Location Prediction.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Named Entity Disambiguation Leveraging Multi-aspect Information.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

Characterization of Android Applications with Root Exploit by Using Static Feature Analysis.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Learning from the past: Improving news summarization with past news articles.
Proceedings of the 2015 International Conference on Asian Language Processing, 2015

Bring User Interest to Related Entity Recommendation.
Proceedings of the Graph Structures for Knowledge Representation and Reasoning, 2015

Citywide traffic congestion estimation with social media.
Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2015

Inferring Diffusion Networks with Sparse Cascades by Structure Transfer.
Proceedings of the Database Systems for Advanced Applications, 2015

Integrity Verification of Replicated File with Proxy in Cloud Computing.
Proceedings of the Cloud Computing and Big Data, 2015

Mining Query Subtopics from Questions in Community Question Answering.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

Burst Time Prediction in Cascades.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Fair Multiple-bank E-cash in the Standard Model.
IACR Cryptol. ePrint Arch., 2014

Non-Malleable Extractors with Shorter Seeds and Min-Entropy Rate <1/2.
IACR Cryptol. ePrint Arch., 2014

A novel variable precision (θ, σ)-fuzzy rough set model based on fuzzy granules.
Fuzzy Sets Syst., 2014

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement Based on Short Signature.
Comput. J., 2014

A novel fuzzy identity based signature scheme based on the short integer solution problem.
Comput. Electr. Eng., 2014

Training data reduction to speed up SVM training.
Appl. Intell., 2014

Popularity Prediction of Burst Event in Microblogging.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Future Influence Ranking of Scientific Literature.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Exploiting Description Knowledge for Keyphrase Extraction.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

An Enhanced Kad Protocol Resistant to Eclipse Attacks.
Proceedings of the 9th IEEE International Conference on Networking, 2014

MMRate: inferring multi-aspect diffusion networks with multi-pattern cascades.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Routing table status influence of Monitoring Kad.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

Fusing Multi-type Features with Distance Metric Learning for Social Image Application.
Proceedings of the International Conference on Internet Multimedia Computing and Service, 2014

An Improved Remote Data Possession Checking Protocol in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Question Retrieval with High Quality Answers in Community Question Answering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Exploit Latent Dirichlet Allocation for One-Class Collaborative Filtering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Concept-based Short Text Classification and Ranking.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Exploiting Timelines to Enhance Multi-document Summarization.
Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, 2014

2013
A Survival Modeling Approach to Biomedical Search Result Diversification Using Wikipedia.
IEEE Trans. Knowl. Data Eng., 2013

Comparable Entity Mining from Comparative Questions.
IEEE Trans. Knowl. Data Eng., 2013

Social image tagging using graph-based reinforcement on multi-type interrelated objects.
Signal Process., 2013

New construction of affiliation-hiding authenticated group key agreement.
Secur. Commun. Networks, 2013

Improving image tags by exploiting web search results.
Multim. Tools Appl., 2013

Video recommendation over multiple information sources.
Multim. Syst., 2013

Efficient and dynamic key management for multiple identities in identity-based systems.
Inf. Sci., 2013

Optimally Anonymous and Transferable Conditional E-cash.
IACR Cryptol. ePrint Arch., 2013

Collaborative Filtering Using Multidimensional Psychometrics Model.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Collaborative Filtering Based on Rating Psychology.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Emerging topic detection for organizations from microblogs.
Proceedings of the 36th International ACM SIGIR conference on research and development in Information Retrieval, 2013

Interaction-Based Social Relationship Type Identification in Microblog.
Proceedings of the Behavior and Social Computing, 2013

ZZX_MT: the BeiHang MT System for NTCIR-10 PatentMT Task.
Proceedings of the 10th NTCIR Conference on Evaluation of Information Access Technologies, 2013

Overcoming Weak Expectations via the Rényi Entropy and the Expanded Computational Entropy.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

Efficient Divisible E-Cash in the Standard Model.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Multiple-Bank E-Cash without Random Oracles.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Negative Influence Minimizing by Blocking Nodes in Social Networks.
Proceedings of the Late-Breaking Developments in the Field of Artificial Intelligence, 2013

From Interest to Function: Location Estimation in Social Media.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
Automatic tagging by exploring tag information capability and correlation.
World Wide Web, 2012

Tagging image by merging multiple features in a integrated manner.
J. Intell. Inf. Syst., 2012

Relationship strength estimation for online social networks with the study on Facebook.
Neurocomputing, 2012

Re-ranking with context for high-performance biomedical information retrieval.
Int. J. Data Min. Bioinform., 2012

Affiliation-Hiding Authenticated Asymmetric Group Key Agreement.
Comput. J., 2012

A provably secure authenticated key agreement protocol for wireless communications.
Comput. Electr. Eng., 2012

Anonymous Transferable Conditional E-cash.
Proceedings of the Security and Privacy in Communication Networks, 2012

On Video Recommendation over Social Network.
Proceedings of the Advances in Multimedia Modeling - 18th International Conference, 2012

Applying adaptive over-sampling technique based on data density and cost-sensitive SVM to imbalanced learning.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

SQL Injection Detection via Program Tracing and Machine Learning.
Proceedings of the Internet and Distributed Computing Systems, 2012

Bootstrap Sampling Based Data Cleaning and Maximum Entropy SVMs for Large Datasets.
Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence, 2012

Personalized video recommendation based on viewing history with the study on YouTube.
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service, 2012

A Semi-Supervised Bayesian Network Model for Microblog Topic Classification.
Proceedings of the COLING 2012, 2012

Who are More Influential Spreaders? Users with Broader Social Circle or with More Friends?
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Data Sparsity: A Key Disadvantage of User-Based Collaborative Filtering?
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

When Sparsity Meets Noise in Collaborative Filtering.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Authenticated key exchange protocol with selectable identities.
Wirel. Commun. Mob. Comput., 2011

Provably secure identity-based authenticated key agreement protocols with malicious private key generators.
Inf. Sci., 2011

Mining and modeling linkage information from citation context for improving biomedical literature retrieval.
Inf. Process. Manag., 2011

Toward an Accurate Snapshot of DHT Networks.
IEEE Commun. Lett., 2011

The Construction of Fuzzy Concept Lattices Based on (θ, σ)-Fuzzy Rough Approximation Operators.
Fundam. Informaticae, 2011

Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems.
Fuzzy Sets Syst., 2011

An efficient and non-interactive hierarchical key agreement protocol.
Comput. Secur., 2011

Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT.
Comput. Commun., 2011

An efficient dynamic authenticated key exchange protocol with selectable identities.
Comput. Math. Appl., 2011

ID Repetition in Structured P2P Networks.
Comput. J., 2011

Promoting ranking diversity for genomics search with relevance-novelty combined model.
BMC Bioinform., 2011

Tagging Image by Exploring Weighted Correlation between Visual Features and Tags.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

A Graph-based Bilingual Corpus Selection Approach for SMT.
Proceedings of the 25th Pacific Asia Conference on Language, Information and Computation, 2011

ZZX_MT: the BeiHang MT System for NTCIR-9 PatentMT Task.
Proceedings of the 9th NTCIR Workshop Meeting on Evaluation of Information Access Technologies: Information Retrieval, 2011

Integrating rich information for video recommendation with multi-task rank aggregation.
Proceedings of the 19th International Conference on Multimedia 2011, Scottsdale, AZ, USA, November 28, 2011

Improved Graph-Based Bilingual Corpus Selection with Sentence Pair Ranking for Statistical Machine Translation.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011

An online video recommendation framework using rich information.
Proceedings of the ICIMCS 2011, 2011

Image Tagging by Exploiting Feature Correlation.
Proceedings of the Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation, 2011

Online MOACO biclustering of microarray data.
Proceedings of the 2011 IEEE International Conference on Granular Computing, 2011

Probabilistic Image Tagging with Tags Expanded By Text-Based Search.
Proceedings of the Database Systems for Advanced Applications, 2011

Learning to recommend questions based on public interest.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Multiobjective optizition shuffled frog-leaping biclustering.
Proceedings of the 2011 IEEE International Conference on Bioinformatics and Biomedicine Workshops, 2011

Promoting Ranking Diversity for Biomedical Information Retrieval Based on LDA.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2011

Tagging Image with Informative and Correlative Tags.
Proceedings of the Web Technologies and Applications - 13th Asia-Pacific Web Conference, 2011

Using Concept-Level Random Walk Model and Global Inference Algorithm for Answer Summarization.
Proceedings of the Information Retrieval Technology, 2011

User Preference Representation Based on Psychometric Models.
Proceedings of the Twenty-Second Australasian Database Conference, 2011

An Iterative Method for Generating Loop Invariants.
Proceedings of the Frontiers in Algorithmics and Algorithmic Aspects in Information and Management, 2011

2010
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security.
Int. J. Secur. Networks, 2010

MOACO Biclustering of gene expression data.
Int. J. Funct. Informatics Pers. Medicine, 2010

Automatic Topic Detection with an Incremental Clustering Algorithm.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

Improving Diversity of Focused Summaries through the Negative Endorsements of Redundant Facts.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

A Novel Composite Kernel for Finding Similar Questions in CQA Services.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Automated Program Verification Using Generation of Invariants.
Proceedings of the 10th International Conference on Quality Software, 2010

The topic-perspective model for social tagging systems.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

A context approach to measuring similarity between questions in the community-based QA services.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

Promoting Ranking Diversity for Biomedical Information Retrieval Using Wikipedia.
Proceedings of the Advances in Information Retrieval, 2010

User's Latent Interest-Based Collaborative Filtering.
Proceedings of the Advances in Information Retrieval, 2010

A relevance-novelty combined model for genomics search result diversification.
Proceedings of the 2010 IEEE International Conference on Bioinformatics and Biomedicine, 2010

Hierarchical Classification with Dynamic-Threshold SVM Ensemble for Gene Function Prediction.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Multisignature Scheme Based on the Generalized Conic Curve.
Int. J. Distributed Sens. Networks, 2009

A New Method for Calculating Similarity between Sentences and Application on Automatic Abstracting.
Intell. Inf. Manag., 2009

Biclustering of microarray data with MOSPO based on crowding distance.
BMC Bioinform., 2009

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

Constructing Program Invariants via Solving QBF.
Proceedings of the TASE 2009, 2009

Server-Controlled Identity-Based Authenticated Key Exchange.
Proceedings of the Provable Security, Third International Conference, 2009

Boosting Biomedical Information Retrieval Performance through Citation Graph: An Empirical Study.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

ID Repetition in Kad.
Proceedings of the Proceedings P2P 2009, 2009

An Efficient Certificateless Encryption Scheme in the Standard Model.
Proceedings of the Third International Conference on Network and System Security, 2009

Learning Kernel Matrix from Gene Ontology and Annotation Data for Protein Function Prediction.
Proceedings of the Advances in Neural Networks, 2009

A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks.
Proceedings of the Scalable Information Systems, 4th International ICST Conference, 2009

Microarray Data Biclustering with Multi-objective Immune Optimization Algorithm.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Multi-objective ant colony optimization biclustering of microarray data.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Predicting gene function with positive and unlabeled examples.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

Active Measurement of Routing Table in Kad.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

BioCLink: A Probabilistic Approach for Improving Genomics Search with Citation Links.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Towards a Better Ranking for Biomedical Information Retrieval Using Context.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Microarray Biclustering with Crowding Based MOACO.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Online New Event Detection Based on IPLSA.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

2008
Modeling and Verifying Time Sensitive Security Protocols with Constraints.
Proceedings of the First International Conference on Foundations of Informatics, 2008

A Novel Derivation Framework For Definite Logic Program.
Proceedings of the First International Conference on Foundations of Informatics, 2008

Cryptanalysis of simple three-party key exchange protocol.
Comput. Secur., 2008

Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

A distributed topology-aware overlays construction algorithm.
Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, Baton Rouge, Louisiana, USA, January 29, 2008

Misusing Kademlia Protocol to Perform DDoS Attacks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

An Example-based Decoder for Spoken Language Machine Translation.
Proceedings of the Third International Joint Conference on Natural Language Processing, 2008

Multi-objective Evolutionary Algorithm for Mining 3D Clusters in Gene-sample-time Microarray Data.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

A Novel Unsupervised Feature Selection Method for Bioinformatics Data Sets through Feature Clustering.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Constraint Abstraction in Verification of Security Protocols.
Proceedings of the Frontiers in Algorithmics, Second Annual International Workshop, 2008

SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Local abstract verification and refinement of security protocols.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

Multi-objective Particle Swarm Optimization Biclustering of Microarray Data.
Proceedings of the 2008 IEEE International Conference on Bioinformatics and Biomedicine, 2008

Similar Sentence Retrieval for Machine Translation Based on Word-Aligned Bilingual Corpus.
Proceedings of the Information Retrieval Technology, 2008

2007
A New Decision Tree Classification Method for Mining High-Speed Data Streams Based on Threaded Binary Search Trees.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Incorporating constituent structure constraint into discriminative word alignment.
Proceedings of Machine Translation Summit XI: Papers, 2007

An Integrated Reordering Model for Statistical Machine Translation.
Proceedings of the MICAI 2007: Advances in Artificial Intelligence, 2007

NUDT machine translation system for IWSLT2007.
Proceedings of the 2007 International Workshop on Spoken Language Translation, 2007

Research of Routing Algorithm in Hierarchy-Adaptive P2P Systems.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Hamiltonicity and Pancyclicity of Binary Recursive Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

A Detection and Offense Mechanism to Defend Against Application Layer DDoS Attacks.
Proceedings of the Third International Conference on Networking and Services (ICNS 2007), 2007

Algorithms for Different Approximations in Incomplete Information Systems with Maximal Compatible Classes as Primitive Granules.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Hamiltonian Property on Binary Recursive Networks.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Constraints Solution for Time Sensitive Security Protocols.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

A New Fuzzy Decision Tree Classification Method for Mining High-Speed Data Streams Based on Binary Search Trees.
Proceedings of the Frontiers in Algorithmics, First Annual International Workshop, 2007

Ontology Based Clustering for Improving Genomic IR.
Proceedings of the 20th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2007), 2007

An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming.
Proceedings of the Advances in Computer Science, 2007

A New Method of Cluster-Based Topic Language Model for Genomic IR.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A New Component-Oriented Programming Language with the First-Class Connector.
Proceedings of the Modular Programming Languages, 7th Joint Modular Languages Conference, 2006

HAND: An Overlay Optimization Algorithm in Peer-to-Peer Systems.
Proceedings of the High Performance Computing and Communications, 2006

Gene Selection for Classifying Microarray Data Using Grey Relation Analysis.
Proceedings of the Discovery Science, 9th International Conference, 2006


  Loading...